Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies

H Ben Attia, L Kahloul, S Benhazrallah… - International Journal of …, 2020 - Springer
Abstract Role-Based Access Control (RBAC) is one of the most used models in designing
and implementation of security policies, in large networking systems. Basic RBAC model …

[PDF][PDF] Towards an extension of RBAC model

A BOUADJEMI, MK ABDI - … Journal of Computing and Digital Systems, 2020 - academia.edu
SystemsRole-based access control (RBAC) has been widely used in information systems
including so-called critical systems. Access control models describe the frameworks that …

[PDF][PDF] A Collaborative Task Role Based Access Control Model.

MA Madani, M Erradi, Y Benkaouz - Journal of Information Assurance & …, 2016 - mirlabs.org
Cloud computing allows to move computing and storage components from individual
systems into the cloud, which provides software and hardware services over the Internet. A …

Incremental verification of physical access control systems

JH Laan - 2021 - essay.utwente.nl
Managing physical access control policies is a complex task. To check that policy changes
do not introduce security or configuration mistakes, formal verification can be employed …

Access control in a collaborative session in multi tenant environment

MA Madani, M Erradi… - 2015 11th International …, 2015 - ieeexplore.ieee.org
Today collaborative applications may enable collaboration among users from the same or
different tenants of a given cloud provider. During such collaborations, the participants need …

A Graph-Based Formal Access Control Model to Support Positive & Negative Permissions, Exceptions, Redundancy & Conflict Detection, Permission to Delegate …

AH Alkhorem - 2024 - search.proquest.com
Access control policies models provide effective approach to control users actives to allow or
deny action to user or group within the resources. This mechanism allowed us to verify the …

How to secure a collaborative session in a single tenant environment

MA Madani, M Erradi - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Cloud computing allows to move computing and storage components from individual
systems into the cloud, which provides software and hardware services over the Internet. A …

APPROVAL SHEET

G Karabatis - search.proquest.com
Untitled Page 1 Page 2 APPROVAL SHEET Title of Dissertation: A Framework for Enforcement of
Purpose-Based Access Control Name of Candidate: Shawn Johnson Dissertation and Abstract …

Formal Modelling and Verification of Security Policies in Cloud Computing

H Benattia - 2019 - thesis.univ-biskra.dz
This thesis tackles the problem of formal modelling and verification of security policies in
cloud computing. Indeed, our research focuses on the modelling and the verification of …

[CITAZIONE][C] A Framework for Enforcement of Purpose Based Access Control

S Johnson - 2019